Is worms similar to viruses that reproduce themselves and subvert computer systems but can spread with no assistance?
Answer
Correct Answer:
True
Note: This Question is unanswered, help us to find answer for this one
_____ is known as hackers who work to protect systems rather than harm them.
Answer
Correct Answer:
“white hat” hackers
Note: This Question is unanswered, help us to find answer for this one
_____ is defined as a secret, malicious computer program hidden within other programs.
Answer
Correct Answer:
Trojan horse
Note: This Question is unanswered, help us to find answer for this one
_____ is creates a false (shadow) version of a website that is controlled by the attacker.
Answer
Correct Answer:
Spoofing
Note: This Question is unanswered, help us to find answer for this one
Is salami techniques a computer crime in which small slices (amounts of money) are taken from many accounts and transferred to that of the thief?
Answer
Correct Answer:
True
Note: This Question is unanswered, help us to find answer for this one
_____ is known as entails a cracker stealing password, account, or credit card information.
Answer
Correct Answer:
Phishing
Note: This Question is unanswered, help us to find answer for this one
_____ is defined as items that are in high demand to be stolen.
Answer
Correct Answer:
Hot products
Note: This Question is unanswered, help us to find answer for this one
_____ is that there should be no restrictions on their right to surf the Internet and test systems.
Answer
Correct Answer:
Hacker’s ethic
Note: This Question is unanswered, help us to find answer for this one
Is hackers unwanted electronic guests regardless of motive?
Answer
Correct Answer:
True
Note: This Question is unanswered, help us to find answer for this one
_____ is known as procedures that ask a panel of experts to predict the future.
Answer
Correct Answer:
Delphi techniques
Note: This Question is unanswered, help us to find answer for this one
_____ is defined as crime that uses the computer as a tool in crime commission.
Answer
Correct Answer:
Cybercrime
Note: This Question is unanswered, help us to find answer for this one
_____ is the idea that change takes place unevenly— technological changes take place far more quickly than the social aspects of a culture such as its laws and customs.
Answer
Correct Answer:
Cultural lag
Note: This Question is unanswered, help us to find answer for this one
Is crackers ill-intended hackers who attempt to crack (break into) computer systems, often in order to do damage?
Answer
Correct Answer:
True
Note: This Question is unanswered, help us to find answer for this one
_____ is known as the stereotypical hacker who is a criminal.
Answer
Correct Answer:
“Black hat” hacker
Note: This Question is unanswered, help us to find answer for this one
Dos and ddos attacks use _______ to prevent authorized users from accessing the system resources.
Answer
Correct Answer:
SYN
Note: This Question is unanswered, help us to find answer for this one
An internet-based crime is referred to as a(n) ____ crime.
Answer
Correct Answer:
Cyber
Note: This Question is unanswered, help us to find answer for this one
Web spoofing is creating a false (shadow) version of a website controlled by the attacker.
Answer
Correct Answer:
True
Note: This Question is unanswered, help us to find answer for this one
The concept that there should be no restrictions on a hacker’s right to surf the net is referred to as ______.
Answer
Correct Answer:
Hacker’s ethics
Note: This Question is unanswered, help us to find answer for this one
Which of the following were identified as British Home Office Predictions?
Answer
Correct Answer:
All of these
Note: This Question is unanswered, help us to find answer for this one
The TV show in which online predators were lured on Internet chat rooms to show up at the homes of minors whose parents were supposedly not home was called ______.
Answer
Correct Answer:
To Catch a Predator
Note: This Question is unanswered, help us to find answer for this one
The development of newer synthetic drugs like ecstasy poses future challenges for crime control.
Answer
Correct Answer:
True
Note: This Question is unanswered, help us to find answer for this one
Which of the following were identified as ways to keep children safe on the internet?
Answer
Correct Answer:
Parents should play a more proactive role in monitoring their children’s use of the internet.
Note: This Question is unanswered, help us to find answer for this one
______ are subprograms (hidden in a program) that contain a virus, bomb, or other harmful feature.
Answer
Correct Answer:
Trojan horses
Note: This Question is unanswered, help us to find answer for this one
Manifest functions are unanticipated, unintended, hidden functions of social change.
Answer
Correct Answer:
False
Note: This Question is unanswered, help us to find answer for this one
Which of the following were identified as crime predictions?
Answer
Correct Answer:
All of these
Note: This Question is unanswered, help us to find answer for this one
Delphi techniques are procedures that ask a panel of experts to predict the future.
Answer
Correct Answer:
True
Note: This Question is unanswered, help us to find answer for this one
The Youth Internet Safety Survey found that ______ percent of the young people they surveyed reported having been the victims of reputed harassment (threats, rumors, or other offensive behavior) during the past year.
Answer
Correct Answer:
Six
Note: This Question is unanswered, help us to find answer for this one
Doing psychological harm to or inciting physical harm against others, thereby breaching laws relating to the protection of the person, is an example of ______.
Answer
Correct Answer:
Cyberviolence
Note: This Question is unanswered, help us to find answer for this one
______ is the idea that technological changes take place far more quickly than the social aspects of a culture such as its laws and customs.
Answer
Correct Answer:
Cultural lag
Note: This Question is unanswered, help us to find answer for this one
Approximately 80 percent of cybercrime is committed by “insiders” or employees.
Answer
Correct Answer:
True
Note: This Question is unanswered, help us to find answer for this one
Cyberterrorism includes all of the following except ______.
Answer
Correct Answer:
Overt communications
Note: This Question is unanswered, help us to find answer for this one